Protecting data assets with two-factor authentication

To better protect the Institute's data – including employee data – from future cyber risks, the Office of Information Technology (OIT) will begin deploying two-factor authentication to early adopters across campus in ...

Scientists produce status check on quantum teleportation

Mention the word 'teleportation' and for many people it conjures up "Beam me up, Scottie" images of Captain James T Kirk. But in the last two decades quantum teleportation – transferring the quantum structure of an object ...

Fed agency blames giant hack on 'neglected' security system

The agency that allowed hackers linked to China to steal private information about nearly every federal employee—and detailed personal histories of millions with security clearances—failed for years to take basic steps ...

Traffic monitoring to generate knowledge

Researchers at UPM have developed an application that generates traffic information for cities and roads by detecting a Bluetooth device boarded on vehicles.

Cybersecurity fears grow as defenses boosted: study

The recent epidemic of cyberattacks has led to greater investment and spending on security, but fears are rising that hackers are gaining the upper hand, a study showed Wednesday.

Google tries to demystify privacy controls with new approach

Google is making its privacy controls easier to find and understand in an attempt to make the more than 1 billion users of its digital services more comfortable about the personal information that they give the Internet's ...

page 12 from 28